Which of the following describes this application threat?

Ann is concerned that the application her team is currently developing is vulnerable to unexpected user
input that could lead to issues within the memory is affected in a detrimental manner leading to potential
exploitation. Which of the following describes this application threat?

Ann is concerned that the application her team is currently developing is vulnerable to unexpected user
input that could lead to issues within the memory is affected in a detrimental manner leading to potential
exploitation. Which of the following describes this application threat?

A.
Replay attack

B.
Zero-day exploit

C.
Distributed denial of service

D.
Buffer overflow



Leave a Reply to Fade Cancel reply4

Your email address will not be published. Required fields are marked *

19 − six =


Lake

Lake

I think the correct answer is D. The keyword is “memory” on the question.

Dugan Nash

Dugan Nash

I picked Buffer Overflow as well. “Unexpected user input” is another important factor.

Paul S

Paul S

It is D Buffer overflow–more commonly known as heap stack buffer overflow attack.

Fade

Fade

It is D: the concern is also potential exploitation [confidentiality and integrity] and not loss of availability [DoS].